What are the steps to perform a volume restore while making the data available during the restore?
A volume has been lost in the production environment, but it is protected by IBM Tivoli Storage
Manager FastBack (TSM FastBack) and a valid snapshot exists for it. What are the steps to
perform a volume restore while making the data available during the restore?
Which three actions provide relevant input to customer authentication scenarios?
Which three actions provide relevant input to customer authentication scenarios? (Choose three.)
Which two components are used with Volume Shadow Copy Service capable IBM Tivoli Storage Manager FastBack clie
Which two components are used with Volume Shadow Copy Service capable IBM Tivoli Storage
Manager FastBack clients? (Choose two.)
Which two requirements are addressed by implementing IBM Tivoli Identity Manager?
Which two requirements are addressed by implementing IBM Tivoli Identity Manager? (Choose
two.)
what will happen when the incremental backup is run for the first time to a newly installed TSM FastBack Clien
With a correctly configured IBM Tivoli Storage Manager FastBack (TSM FastBack) policy
configured to perform an incremental backup, what will happen when the incremental backup is
run for the first time to a newly installed TSM FastBack Client that has successfully connected to
the TSM FastBack server?
Which three corresponding security requirements can be addressed by IBM Tivoli Federated Identity Manager?
As you analyze a customer business processes, you focus on a subset dealing with crossenterprise Web transactions, both HTML- and SOAP-based. Which three corresponding security
requirements can be addressed by IBM Tivoli Federated Identity Manager? (Choose three.)
Which level of cleanup configuration should be selected?
An enterprise is a 24/7 operation and has a lot of WAN traffic. Due to the low network bandwidth
available for cleanup, cleanup should run when the entire job is eligible. Which level of cleanup
configuration should be selected?
Which encryption method is used by IBM Tivoli Access Manager for e-business (ITAMeb) when ITAMeb is configured
Which encryption method is used by IBM Tivoli Access Manager for e-business (ITAMeb) when
ITAMeb is configured with the FIPS mode enabled?
How can more space be added to the repository?
The IBM Tivoli Storage Manager FastBack (TSM FastBack) repository is almost full. A service
window is not available where the TSM FastBack server can be taken down to add additional
hardware. More repository space is needed until additional hardware can be installed. How can
more space be added to the repository?
Which two security requirements are addressed by IBM Tivoli Access Manager for e-business?
Which two security requirements are addressed by IBM Tivoli Access Manager for e-business?
(Choose two.)